CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. |
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. |
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network. |
Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network. |
Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network. |
Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. |
Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. |
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. |
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. |
Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally. |
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. |
Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. |
Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network. |
In Foxit PDF Reader and Editor before 2024.1, Local Privilege Escalation could occur during update checks because weak permissions on the update-service folder allow attackers to place crafted DLL files there. |
Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. |
Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally. |
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. |